Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet Exam NSE6_FWB-6.4 Topic 1 Question 32 Discussion

Actual exam question for Fortinet's NSE6_FWB-6.4 exam
Question #: 32
Topic #: 1
[All NSE6_FWB-6.4 Questions]

Refer to the exhibit.

FortiADC is applying SNAT to all inbound traffic going to the servers. When an attack occurs, FortiWeb blocks traffic based on the 192.0.2.1 source IP address, which belongs to FortiADC. The setup is breaking all connectivity and genuine clients are not able to access the servers.

What must the administrator do to avoid this problem? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Lynda
1 months ago
Option D, 'Enable the Add X-Forwarded-For setting on FortiWeb', seems like the most straightforward solution. Keep it simple, you know?
upvoted 0 times
...
Leslie
2 months ago
Haha, the setup is 'breaking all connectivity'? Sounds like a real nightmare! I'd definitely choose option A or D to avoid that headache.
upvoted 0 times
Ardella
20 hours ago
Option D) Enable the Add X-Forwarded-For setting on FortiWeb.
upvoted 0 times
...
Shawana
6 days ago
Option A) Enable the Use X-Forwarded-For setting on FortiWeb.
upvoted 0 times
...
...
Corinne
2 months ago
Placing FortiWeb in front of FortiADC, as suggested in option C, could work, but it seems like an overly complicated solution. I'd go with option A or D instead.
upvoted 0 times
Danica
10 days ago
Let's go with options A and D then. It should help avoid breaking connectivity for genuine clients.
upvoted 0 times
...
Delsie
12 days ago
I agree, placing FortiWeb in front of FortiADC might be too complicated. Using X-Forwarded-For settings seems like a simpler solution.
upvoted 0 times
...
Lenny
13 days ago
Option A and D are good suggestions. Enabling X-Forwarded-For on FortiWeb can help avoid blocking genuine clients.
upvoted 0 times
...
...
Corinne
2 months ago
Option B doesn't sound right to me. If the attack is blocking access, we can't just rely on a timeout to fix it. We need to take proactive steps.
upvoted 0 times
Kathryn
1 months ago
Agreed, adding X-Forwarded-For can also help in this situation.
upvoted 0 times
...
Rory
1 months ago
D) Enable the Add X-Forwarded-For setting on FortiWeb.
upvoted 0 times
...
Frank
1 months ago
Yes, enabling X-Forwarded-For on FortiWeb can help with the source IP address issue.
upvoted 0 times
...
Evelynn
2 months ago
C) Place FortiWeb in front of FortiADC.
upvoted 0 times
...
Jerlene
2 months ago
A) Enable the Use X-Forwarded-For setting on FortiWeb.
upvoted 0 times
...
...
Florinda
3 months ago
I think option A is the way to go. Enabling the Use X-Forwarded-For setting on FortiWeb should help preserve the original client IP address and avoid the connectivity issues.
upvoted 0 times
Almeta
2 months ago
User2: Yeah, enabling the Use X-Forwarded-For setting on FortiWeb should help preserve the original client IP address.
upvoted 0 times
...
Felicia
2 months ago
User1: I agree, option A seems like the best solution.
upvoted 0 times
...
...
Jutta
3 months ago
I also think placing FortiWeb in front of FortiADC could be a good solution to avoid breaking connectivity.
upvoted 0 times
...
Bette
3 months ago
I agree with Domonique. Enabling the Use X-Forwarded-For setting will help avoid blocking genuine clients.
upvoted 0 times
...
Domonique
3 months ago
I think the administrator should enable the Use X-Forwarded-For setting on FortiWeb.
upvoted 0 times
...

Save Cancel